메뉴 건너뛰기




Volumn 38, Issue 1, 2012, Pages 191-204

Reducing unauthorized modification of digital objects

Author keywords

access controls; file organization; operating systems; Protection mechanisms; software release management and delivery; system integration and implementation

Indexed keywords

DIGITAL OBJECTS; GENERAL APPROACH; KERNEL MODIFICATIONS; OVERHEAD COSTS; PROTECTION MECHANISMS; PUBLIC KEY INFRASTRUCTURE; ROOTKITS; SYSTEM INTEGRATION; UNAUTHORIZED MODIFICATION;

EID: 84856541805     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2011.7     Document Type: Article
Times cited : (3)

References (63)
  • 5
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • DOI 10.1145/1242572.1242661, 16th International World Wide Web Conference, WWW2007
    • D. Florncio and C. Herley, "A Large-Scale Study of Web Password Habits," Proc. 16th Int'l Conf. World Wide Web, pp. 657-666, 2007. (Pubitemid 47582295)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 657-666
    • Florencio, D.1    Herley, C.2
  • 11
    • 84856525128 scopus 로고    scopus 로고
    • Web Site (viewed 28 Aug. 2009)
    • "Google Android," Web Site (viewed 28 Aug. 2009), http://code.google.com/android/, 2011.
    • (2011) Google Android
  • 12
    • 34548708575 scopus 로고    scopus 로고
    • Lurking in the shadows: Identifying systemic threats to kernel data (short paper)
    • DOI 10.1109/SP.2007.25, 4223229, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • A. Baliga, P. Kamat, and L. Iftode, "Lurking in the Shadows: Identifying Systemic Threats to Kernel Data," Proc. IEEE Symp. Security and Privacy, pp. 246-251, May 2007. (Pubitemid 47432531)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 246-251
    • Baliga, A.1    Kamat, P.2    Iftode, L.3
  • 17
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Aug.
    • N.L. Petroni Jr., T. Fraser, A. Walters, and W. Arbaugh, "An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data," Proc. 15th USENIX Security Symp., pp. 289-304, Aug. 2006.
    • (2006) Proc. 15th USENIX Security Symp. , pp. 289-304
    • Petroni Jr., N.L.1    Fraser, T.2    Walters, A.3    Arbaugh, W.4
  • 19
    • 84988573115 scopus 로고
    • The design and implementation of tripwire: A file system integrity checker
    • G.H. Kim and E.H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker," Proc. ACM Conf. Computer and Comm. Security, pp. 18-29, 1994.
    • (1994) Proc. ACM Conf. Computer and Comm. Security , pp. 18-29
    • Kim, G.H.1    Spafford, E.H.2
  • 22
    • 84856535361 scopus 로고    scopus 로고
    • web page, Nov.
    • "WriteFileEx Function," web page, http://msdn.microsoft.com/en- us/library/aa365748 (VS.85).aspx, Nov. 2008.
    • (2008) WriteFileEx Function
  • 23
    • 84856535362 scopus 로고    scopus 로고
    • Digital Signatures for Kernel Modules on Systems Running Windows Vista, Microsoft, July
    • Digital Signatures for Kernel Modules on Systems Running Windows Vista, Microsoft, http://www.microsoft.com/whdc/winlogo/drvsign/kmsigning.mspx, July 2007.
    • (2007)
  • 24
    • 55549097262 scopus 로고    scopus 로고
    • Subverting vista kernel for fun and profit
    • Aug.
    • J. Rutkowska, "Subverting Vista Kernel for Fun and Profit," Blackhat Presentation, http://blackhat.com/presentations/bh-usa-06/BH-US-06- Rutkowska.pdf, Aug. 2006.
    • (2006) Blackhat Presentation
    • Rutkowska, J.1
  • 27
    • 84856556461 scopus 로고    scopus 로고
    • web site (viewed 22 Jan. 2009)
    • "Bsign," web site (viewed 22 Jan. 2009), http://packages. debian. org/lenny/bsign, 2011.
    • (2011) Bsign
  • 28
    • 84856535360 scopus 로고    scopus 로고
    • Patchset from Linux Kernel Mailing List (LKML: 14 Feb. 2007), Feb.
    • D. Howells, "Modsign: Kernel Module Signing," Patchset from Linux Kernel Mailing List (LKML: 14 Feb. 2007), http://lkml.org/lkml/2007/2/14/ 164, Feb. 2007.
    • (2007) Modsign: Kernel Module Signing
    • Howells, D.1
  • 30
    • 80955137032 scopus 로고    scopus 로고
    • Make/dev/kmem a config option
    • Apr.
    • A. van de Ven, "make/dev/kmem a Config Option," GIT Commit, http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6-stable.git;a= commit;h=b781ecb6a379f155568ef7093e 38c6c1d857fe53, Apr. 2008.
    • (2008) GIT Commit
    • Van De Ven, A.1
  • 31
    • 84856556463 scopus 로고    scopus 로고
    • X86: Introduce/dev/mem restrictions with a config option
    • Apr.
    • A. van de Ven, "x86: Introduce/dev/mem Restrictions with a Config Option," GIT Commit, http://git.kernel.org/?p=linux/kernel/git/stable/ linux-2.6-st a b l e . g it;a=commit;h= ae531c26c5c2a28ca1b35a75b39b3b256850f2c8, Apr. 2008.
    • (2008) GIT Commit
    • Van De Ven, A.1
  • 32
    • 32344445800 scopus 로고    scopus 로고
    • Signed kernel modules
    • Jan.
    • G. Kroah-Hartman, "Signed Kernel Modules," Linux J., vol. 117, pp. 48-53, Jan. 2004.
    • (2004) Linux J. , vol.117 , pp. 48-53
    • Kroah-Hartman, G.1
  • 34
    • 0003508562 scopus 로고
    • Federal Information Processing Standards Publication 186, technical report, US Dept. of Commerce/NIST, Nat'l Technical Information Service, Virginia
    • "'Digital Signature Standard," Federal Information Processing Standards Publication 186, technical report, US Dept. of Commerce/NIST, Nat'l Technical Information Service, Virginia, 1994.
    • (1994) Digital Signature Standard
  • 37
    • 77950577461 scopus 로고    scopus 로고
    • Playing with ptrace, part 1
    • Nov.
    • P. Padala, "Playing with ptrace, Part 1," Linux J., vol. 103, Nov. 2002.
    • (2002) Linux J. , vol.103
    • Padala, P.1
  • 38
    • 84856548204 scopus 로고    scopus 로고
    • web page, Dec.
    • Y.K. Okuji, "GNU GRUB," web page, http://www.gnu.org/software/ grub/, Dec. 2008.
    • (2008) GNU GRUB
    • Okuji, Y.K.1
  • 39
    • 84856522864 scopus 로고    scopus 로고
    • Google, developer website, July
    • Google, "Android Developer Guide,"developer website, http://developer.android.com/guide/publishing/app-signing.html, July 2009.
    • (2009) Android Developer Guide
  • 40
    • 84856548205 scopus 로고    scopus 로고
    • Digital signatures
    • second ed., O'Reilly Media, Inc., May
    • S. Oaks, "Digital Signatures," Java Security, second ed., O'Reilly Media, Inc., May 2001.
    • (2001) Java Security
    • Oaks, S.1
  • 43
    • 84856556464 scopus 로고    scopus 로고
    • web page (accessed 15 Dec. 2008)
    • "Knoppix Linux," web page (accessed 15 Dec. 2008), http://www.knoppix.net, 2011.
    • (2011) Knoppix Linux
  • 48
    • 0023401916 scopus 로고
    • An approach to containing computer viruses
    • Aug.
    • M. Pozzo and T. Gray, "An Approach to Containing Computer Viruses," Computers and Security, vol. 6, no. 4, pp. 321-331, Aug. 1987.
    • (1987) Computers and Security , vol.6 , Issue.4 , pp. 321-331
    • Pozzo, M.1    Gray, T.2
  • 49
    • 0024664208 scopus 로고
    • Defending systems against viruses through cryptographic authentication
    • May
    • G. Davida, Y. Desmedt, and B. Matt, "Defending Systems Against Viruses through Cryptographic Authentication," Proc. Symp. Security and Privacy, pp. 312-318, May 1989.
    • (1989) Proc. Symp. Security and Privacy , pp. 312-318
    • Davida, G.1    Desmedt, Y.2    Matt, B.3
  • 50
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the linux operating system
    • June
    • P. Loscocco and S. Smalley, "Integrating Flexible Support for Security Policies into the Linux Operating System," FREENIX '01: Proc. USENIX Ann. Technical Conf., June 2001.
    • (2001) FREENIX '01: Proc. USENIX Ann. Technical Conf.
    • Loscocco, P.1    Smalley, S.2
  • 51
    • 85077749236 scopus 로고    scopus 로고
    • Analyzing integrity protection in the SELinux example policy
    • Aug.
    • T. Jaeger, R. Sailer, and X. Zhang, "Analyzing Integrity Protection in the SELinux Example Policy," Proc. 12th USENIX Security Symp., pp. 59-74, Aug. 2003.
    • (2003) Proc. 12th USENIX Security Symp. , pp. 59-74
    • Jaeger, T.1    Sailer, R.2    Zhang, X.3
  • 53
    • 84946224955 scopus 로고
    • Technical Report CSC-EPL-92-001, Nat'l Computer Security Center, Apr.
    • "Trusted XENIX Version 3.0 Final Evaluation Report," Technical Report CSC-EPL-92-001, Nat'l Computer Security Center, Apr. 1992.
    • (1992) Trusted XENIX Version 3.0 Final Evaluation Report
  • 55
    • 78650020201 scopus 로고    scopus 로고
    • O'Reilly Media, Inc.
    • C. Tyler, Fedora Linux. O'Reilly Media, Inc., 2007.
    • (2007) Fedora Linux
    • Tyler, C.1
  • 59
    • 0141528667 scopus 로고    scopus 로고
    • A logical reconstruction of SPKI
    • J.Y. Halpern and R. van der Meyden, "A Logical Reconstruction of SPKI," J. Computer Security, vol. 11, no. 4, pp. 581-613, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 581-613
    • Halpern, J.Y.1    Van Der Meyden, R.2
  • 60
    • 0032204757 scopus 로고    scopus 로고
    • Mobile code security
    • A.D. Rubin and D.E. Geer Jr., "Mobile Code Security," IEEE Internet Computing, vol. 2, no. 6, pp. 30-34, Nov. 1998. (Pubitemid 128558708)
    • (1998) IEEE Internet Computing , vol.2 , Issue.6 , pp. 30-34
    • Rubin, A.D.1    Geer Jr., D.E.2
  • 61
    • 36849044142 scopus 로고    scopus 로고
    • Secure software installation in a mobile environment
    • DOI 10.1145/1280680.1280705, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security
    • A.P. Heiner and N. Asokan, "Secure Software Installation in a Mobile Environment," Proc. Poster, Third Symp. Usable Privacy and Security, pp. 155-156, 2007. (Pubitemid 350229392)
    • (2007) ACM International Conference Proceeding Series , vol.229 , pp. 155-156
    • Heiner, A.P.1    Asokan, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.